Berkeley CSUA MOTD:Entry 14326
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/11/23 [General] UID:1000 Activity:popular
11/23   

1998/7/14 [Computer/SW/Unix] UID:14326 Activity:low
7/14    WinCE 2.1 will have such new features as shutting down the
screen
        when it's not in use.  How advanced!
        http://www.zdnet.com/pcweek/news/0713/13palm.html
        \_ <wince>
        \_ This is so fucking cool.  UNIX is dead on the laptop for sure now.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2024/11/23 [General] UID:1000 Activity:popular
11/23   

You may also be interested in these entries...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/3/29-6/4 [Computer/HW/Memory, Computer/HW/CPU, Computer/HW/Drives] UID:54351 Activity:nil
3/29    A friend wants a PC (no mac). She doesn't want Dell. Is there a
        good place that can custom build for you (SSD, large RAM, cheap video
        card--no game)?
        \_ As a side note: back in my Cal days more than two decades ago when
           having a 387SX made me the only person with floating-point hardware,
           most machines were custom built.
	...
2012/1/27-3/26 [Computer/SW/Unix] UID:54299 Activity:nil
1/27    Interesting list of useful unix tools. Shout out to
        cowsay even!
        http://www.stumbleupon.com/su/3428AB/kkovacs.eu/cool-but-obscure-unix-tools
        \_ This is nice.  Thanks.
	...
2011/10/26-12/6 [Computer/SW/Unix] UID:54202 Activity:nil
10/24  What's an easy way to see if say column 3 of a file matches a list of
       expressions in a file? Basically I want to combine "grep -f <file>"
       to store the patterns and awk's $3 ~ /(AAA|BBB|CCC)/ ... I realize
       I can do this with "egrep -f " and use regexp instead of strings, but
       was wondering if there was some magic way to do this.
       \_ UNIX has no magic. Make a shell script to produce the ask or egrep
	...
2010/3/10-30 [Computer/SW/Mail] UID:53751 Activity:nil
3/10    What email program do people in Cal CS use nowadays?  In my school days
        people used /usr/bin/mail, then RMail in emacs, then VMail in emacs.
        After my days people used Elm, Pine, Mutt (I forgot which order).  In
        my first two jobs we could tell the seniority of fellow engineers based
        on which email program they use at work, because everyone used what
        they used to use in their school years.  In my last two jobs though,
	...
2009/11/13-30 [Computer/SW/Unix] UID:53523 Activity:nil
11/12   How does one find out if a system has rootkit installed?
        \_ Unix or m$?
           \_ Unix. On M$ I always assume it's compromised.
              \_ Install Tripwire before you plug your server into The Net?
                 The only other answer I can think of is to reinstall the
                 OS from scratch on another server and do an md checksum
	...
2009/9/4-12 [Computer/SW/OS/FreeBSD] UID:53331 Activity:kinda low
9/4     I'm seriously very happy Soda no longer runs FreeBSD.
        FreeBSD is really going down the tubes
        http://freebsdgirl.com/2009/08/its-a-dirty-job-but-someone-ha.html
        \_ funny, I dont remember it geting pwned anywhere near as many tmies
           as it has since the switch to Linux.  And that blog post is
           only abou the installer, not the running OS
	...
2009/7/24-29 [Computer/SW/Editors/Vi] UID:53195 Activity:low
7/24    Is dos2unix available somewhere?  Someone added all those Ctrl-M's to
        motd.public.
        \_ %s/^V^M//g in vim. What has your editor done for you today?
           \_ that works great in vi actually... in vim :set filetype=unix
	...
Cache (2417 bytes)
www.zdnet.com/pcweek/news/0713/13palm.html -> techupdate.zdnet.com
The top IT priorities in May 2004 are 22 Wired & Wireless, 23 Hardware Upgrades, 24 Software Infrastructure, 25 Security, and 26 Web Technology. Digital information and services will be delivered by trillions of RFID sensors to almost everything we touch-kiosks, airplane seats, newspapers and a broad array of new devices. The privacy issue will prove to be the most daunting challenge in bringing about the fully connected world. Users focusing on lean maintenance management should realize significant savings against an often-ignored budget line item. Following dozens of interviews, The Yankee Group assembled a set of best practices for systems licensing and negotiations. This is particularly true for PCs and other end-user devices. Organizations should strive to keep the number of active vendors low. However, the current reality remains decidedly less tantalizing. RFID tags and networked readers will ultimately replace bar codes and (human) handheld readers. A few key technology trends will impact user decisions during 2004/05. Start-up Fortify Software is pioneering an automated inside-out, root-cause approach that could improve the security of software by systematically weeding out vulnerabilities as an integral part of the software development process. Gartner analyst Richard Hunter says the only defense is for individuals to gain control of their digital information. For companies, the potential for more profits and long-term customers should be enough of an incentive to build competency around the concepts of privacy and trust. The extended enterprise forces organizations to allow onto the corporate network computers (including home PCs, those belonging to business partners and remote employee laptops) with uncontrolled configurations. In fact, Google may become as relevant within enterprises in the future as Microsoft or Cisco are today. In the same announcement, Kumar was appointed to the newly created position of chief software architect. Along with analytics, UAN is critical to Siebel's strategy of expanding and deepening its application and technology footprint within enterprise accounts. To address the authentication issues, Microsoft and Yahoo are advocating their proprietary technologies, while a third, caller-ID-like spec known as Sender Policy Framework is proving why open may be the way to go. Enter SMTPi, a unique and promising if misleadingly named solution.